Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?

A. brute force
B. heuristic
C. signature
D. anomaly

Answer: B

Computer Science & Information Technology

You might also like to view...

The OR function evaluates two conditions; if TRUE is displayed in the cell, ________ of the conditions must be true

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ manager makes low-level decisions by following well-defined set of routine procedures

A. operational B. tactical C. strategic D. executive

Computer Science & Information Technology